Systems and Methods for Restricting The Use of Stolen Devices on a Wireless Network
First Claim
1. A system for restricting the use of a wireless device on a wireless network, the system comprising:
- a wireless network device management system comprising a computer readable memory and a processor, the wireless device management system being configured to;
receive, from a warehouse management system, a device identifier associated with the wireless device; and
store the device identifier in the computer readable memory with a purchase indicator, wherein the purchase indicator initially is set to indicate that the wireless device has not been sold.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for controlling wireless network access for wireless devices are disclosed. In an exemplary embodiment, a system can create an electronic record for a device intended for sale in a retail store. The record associated with the device can include an indication that the device has not been sold, and the device can be shipped to the retail store. When the device is purchased, the retail store can communicate to the wireless service provider that the device has been sold, and the system can update the electronic record to reflect that the device has been sold. The sold device can be allowed to access a network. An attempt to use a device marked as unsold can result in the call being routed to a fraud management center for verification of proper device purchase. Additional exemplary systems and methods also are disclosed.
-
Citations
18 Claims
-
1. A system for restricting the use of a wireless device on a wireless network, the system comprising:
a wireless network device management system comprising a computer readable memory and a processor, the wireless device management system being configured to; receive, from a warehouse management system, a device identifier associated with the wireless device; and store the device identifier in the computer readable memory with a purchase indicator, wherein the purchase indicator initially is set to indicate that the wireless device has not been sold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method for routing calls in a wireless network, the method comprising:
-
capturing a device identifier transmitted by a wireless device attempting to place a call using the wireless network; comparing the captured device identifier to a device identifier stored in a computer readable memory to determine if the stored device identifier matches the captured device identifier; and if the captured device identifier matches the stored device identifier; retrieving, from the computer readable memory, a purchase indicator stored with the stored device identifier; and routing a call to a fraud management center if the purchase indicator comprises data indicating that a device has not been sold. - View Dependent Claims (11)
-
-
12. A package scanner for electronically marking a wireless device as not sold, the packaging scanner comprising an electronic reader and a computer readable memory, wherein the package scanner is configured to:
-
obtain, using the electronic reader, a device identifier associated with a wireless device; and store, at the computer readable memory, the device identifier and a purchase indicator, the purchase indicator comprising data that indicates that the device has not been sold. - View Dependent Claims (13, 14)
-
-
15. A method for connecting a wireless device with a fraud management center, the method comprising:
-
determining, at the wireless communications network, that the wireless device is stolen; and connecting the wireless device with the fraud management center. - View Dependent Claims (16, 17, 18)
-
Specification